trunk patch: http://svn.apache.org/r1500345
http://svn.apache.org/r1500362
http://svn.apache.org/r1500423
http://svn.apache.org/r1500483
http://svn.apache.org/r1500519
Submitted by: fuankg
Reviewed by: jim, minfrin
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@
1523259 13f79535-47bb-0310-9956-
ffa450edef68
Changes with Apache 2.4.7
+ *) modules: Fix some compiler warnings. [Guenter Knauf]
+
* skiplist: Add skiplist capability to httpd [Jim Jagielski]
* Sync 2.4 and trunk
2.4.x patch: trunk patch works
+1: trawick, covener, humbedooh
- * modules: Fix some compiler warnings.
- trunk patch: http://svn.apache.org/r1500345
- http://svn.apache.org/r1500362
- http://svn.apache.org/r1500423
- http://svn.apache.org/r1500483
- http://svn.apache.org/r1500519
- 2.4.x patch: trunk patches work
- +1: fuankg, jim, minfrin
- comments:
- jim: In general, casts are sometimes used to "hide" problems
- that exist, esp when using the incorrect data types...
- Are these casts safe?
- fuankg: replied to list with further details about patches.
- humbedooh: in r1500362, the lua changes can just be backported now :)
-
PATCHES PROPOSED TO BACKPORT FROM TRUNK:
[ New proposals should be added at the end of the list ]
#define LDAP_DECLARE_DATA __declspec(dllimport)
#endif
+#ifdef WIN32
+#define timeval l_timeval
+#endif
+
#ifdef __cplusplus
extern "C" {
#endif
{
apr_status_t rv;
int thread_limit = 0;
- int nservers = 0;
+ apr_uint16_t nservers = 0;
char *cache_config;
char *split;
char *tok;
charset_filter_ctx_t *ctx = f->ctx;
const char *msg;
char msgbuf[100];
- int len;
+ apr_size_t len;
switch(ctx->ees) {
case EES_LIMIT:
apr_brigade_length(ctx->bb, 1, &len);
clen = apr_atoi64(content_length);
if (clen >= 0 && clen < APR_INT32_MAX) {
- ap_set_content_length(r, len + apr_base64_encode_len(clen) - 1);
+ ap_set_content_length(r, len +
+ apr_base64_encode_len((int)clen) - 1);
}
else {
apr_table_unset(r->headers_out, "Content-Length");
if (r)
ap_rputc('0' + i % 10, r);
else
- apr_file_putc('0' + i % 10, out);
+ apr_file_putc((char)('0' + i % 10), out);
}
else {
if (r)
r = ap_lua_check_request_rec(L, 1);
luaL_checktype(L, 2, LUA_TSTRING);
path = lua_tostring(L, 2);
- mtime = luaL_optnumber(L, 3, apr_time_now());
+ mtime = (apr_time_t)luaL_optnumber(L, 3, (lua_Number)apr_time_now());
status = apr_file_mtime_set(path, mtime, r->pool);
lua_pushboolean(L, (status == 0));
return 1;
apr_uri_t uri;
const char *connectname;
- int connectport = 0;
+ apr_port_t connectport = 0;
/* is this for us? */
if (r->method_number != M_CONNECT) {
return rv;
}
-static apr_status_t send_begin_request(proxy_conn_rec *conn, int request_id)
+static apr_status_t send_begin_request(proxy_conn_rec *conn,
+ apr_uint16_t request_id)
{
struct iovec vec[2];
fcgi_header header;
}
static apr_status_t send_environment(proxy_conn_rec *conn, request_rec *r,
- int request_id)
+ apr_uint16_t request_id)
{
const apr_array_header_t *envarr;
const apr_table_entry_t *elts;
itr += vallen;
}
- fill_in_header(&header, FCGI_PARAMS, request_id, bodylen, 0);
+ fill_in_header(&header, FCGI_PARAMS, request_id, (apr_uint16_t)bodylen, 0);
fcgi_header_to_array(&header, farray);
vec[0].iov_base = (void *)farray;
}
static apr_status_t dispatch(proxy_conn_rec *conn, proxy_dir_conf *conf,
- request_rec *r, int request_id)
+ request_rec *r, apr_uint16_t request_id)
{
apr_bucket_brigade *ib, *ob;
int seen_end_of_headers = 0, done = 0;
* multiple requests to the same FastCGI connection, but
* we don't support that, and always use a value of '1' to
* keep things simple. */
- int request_id = 1;
+ apr_uint16_t request_id = 1;
apr_status_t rv;
/* Step 1: Send FCGI_BEGIN_REQUEST */